What is an IP address?
IP-address (IP from the English Internet Protocol) - is a digital
identifier, assigned to a device that operates in a public or local network based on TCP /
IP protocol stack. Without it, the Internet or any internal IP network cannot exist.
Compare the IP address with a telephone number or home address -
both point to an object. Just as a person calls a number, a computer calls another device
with an IP address.
IP-address structure
Let's analyze the structure of IP-addresses on the example of the
first and most common Internet protocol IPv4.An IPv4 IP address has a 32-bit (4 bytes)
structure. It is divided into 4 parts, each consisting of 8 bits (1 byte) and is called an
octet. Each bit of an IP address is a binary digit.
An example of an address (IPv4) in binary form: 11000000.10101000.00110010.00000001.
Converting an octet from binary to decimal results in a single number with a value between 0 and 255.
IP address in decimal form: 192.168.50.1.
Converting an octet from binary to decimal results in a single number with a value between 0 and 255.
IP address in decimal form: 192.168.50.1.
Subnet Mask
Devices distinguish parts of an IP address using a subnet mask, a 32-bit string divided into
4 octets, just like an IP address. When a connection is established, each octet of the IP
address is mapped to an octet of the subnet mask.
The default subnet mask on a standard home network is 255.255.255.0.
In the example, the IP address mask is given in decimal representation and contains the numbers "255" and "0". The first identifies the network and the second identifies the destination host.
The default subnet mask on a standard home network is 255.255.255.0.
In the example, the IP address mask is given in decimal representation and contains the numbers "255" and "0". The first identifies the network and the second identifies the destination host.
IP address classes
Class A. The highest bit in addresses of this format is always 0. The
initial octet is responsible for identifying the network, allowing 127 unique networks. The
remaining 3 octets are used to identify nodes, with a maximum of 17 million per network.
Class B. The first bits of the IP address are 10. The initial two octets
refer to the network ID and the last two octets refer to the node ID. There may be 16384
networks, each supporting 65000 nodes.
Class C. The initial bits of the IP address are 110. The first three octets
are responsible for the network identification and allow the creation of 2 million networks.
The last octet is used to identify the nodes, the maximum number of which is 254 per
network.
Class D. The IP address is recorded beginning with bits 1110. A network of
this format uses a broadcast to send messages to multiple nodes.
Class E. IP addresses are reserved for future use. The first bits are
always 11110.
An IP address in a class-based network addressing architecture has two parts:
Network ID. Identifies the network containing the connected nodes.
Node ID. It's responsible for specifying a node: server, router or any other TCP/IP device.
Network ID. Identifies the network containing the connected nodes.
Node ID. It's responsible for specifying a node: server, router or any other TCP/IP device.
Important! Because of limited resources of addresses IPv4, nowadays class
addressing is
almost ceased to be used. It has been replaced by the technology of Classless Inter-Domain
Routing (CIDR). Classless Inter-Domain Routing uses the IPv4 address range more sparingly
because it does not strictly bind subnet masks to subnet addresses.
TCP/IP
Any network with IP addressing is based on TCP/IP, a model that includes a stack of
protocols used to transmit data over the network. The basic protocols are TCP and IP, but
there are many other options.
TCP/IP layers
Link. Responsible for the physical transmission of data through the use of protocols such as
Ethernet or WI-FI.
Network (Internet). This layer is where the IP address system is located
and where routing is performed - the movement of packets between devices. The network layer
combines the protocols: IP, ICMP, IGMP.
Transport layer. The TCP and UDP protocols are located here and are
responsible for the
transfer of data. The first carries out a guaranteed transfer of information, preliminarily
establishing a connection to the network. The second sends messages without a "handshake",
which increases the speed of data transfer, but also creates the risk of losing individual
packets.
Applied. It combines all high level protocols that interact with system
applications. These include Telnet, FTP, SMTP, SNMP, and the like.
Network location of IP addresses
Unique IP addresses that are assigned by special organizations (such as an ISP) are called
external, white or public IP addresses. Public IP addresses are used to access the Internet
and to communicate with other hosts over a public network. A device with an external IP
address is visible to other users on the Internet.
There are also private IP addresses, also called gray or internal addresses. Gray IP
addresses are assigned to devices on a local network and are not visible on the Internet.
For example, you can imagine a house with several devices connected to a WI-FI router. They
are all connected to the same network and have gray IP addresses.
IPv6
The Internet began to grow rapidly from the 1980s, so there was a threat of depletion of the
pool of possible addresses - they simply would not be enough for all networks and nodes.
That's why in 1995, the IPv6 format was introduced. It increased the length of IP addresses
from 32 to 128 bits, and changed the decimal system from hexadecimal.
IPv6 IP address consists of 16 octets (8 blocks of 2 octets), separated by colons. The full IPv6 notation looks like this: 2001:0bd7:0ccf:0006:0000:0000:012f:002d.
An IPv6 address can be compressed by excluding zeros from the entry. The abbreviated form of IPv6 is: 2001:bd7:ccf:12f:2d.
IPv6 IP address consists of 16 octets (8 blocks of 2 octets), separated by colons. The full IPv6 notation looks like this: 2001:0bd7:0ccf:0006:0000:0000:012f:002d.
An IPv6 address can be compressed by excluding zeros from the entry. The abbreviated form of IPv6 is: 2001:bd7:ccf:12f:2d.
DNS and IP address
When surfing the Internet, a user establishes a connection through a browser to other
servers based not primarily on the IP address, but rather on the domain name. The Domain
Name System (DNS) serves to redirect the user to a permanent IP address for the final web
resource. In simple terms, it converts the alphabetic values of a domain name into numbers
for an IP address.
For example, you don't have to enter the numeric address "74.125.131.100" to get to a Google
search engine site. It is enough to type in the address bar the domain name ".google.com".
DNS-server is responsible for such redirection, and it works according to information from
DNS-records. Continuing the "telephone" analogy, if the IP address is a telephone number,
the DNS server is a telephone book that contains all such numbers.
How to find out the IP address
You can determine the IP address of the device you are using by using a browser search like
"what is my IP". Many services, such as Whoer, 2ip, and WhiteWhois, check the IP address ID
and provide more detailed information about the user (such as the name of the provider or
the approximate location of the device).
On a local network, the address of the device is specified in the settings of the operating system, so you don't need to use external tools. You can determine the local IP address in the following ways.
Windows - through the command line (search -> "cmd" -> in the window type "ipconfig").
Unix/Linux - with the command "ifconfig".
MacOS - "System Preferences" -> "Network".
iOS - via "Settings. "Wi-Fi" -> click on the information icon "i" -> information in the tab "DHCP".
Android - "Settings" -> "About phone" -> "General information".
Anonymity and Security
"I'll identify you by IP."
This is more of a myth than a real threat. There is a misconception among users that an intruder can track a person by getting his external IP address. In fact, it's not that simple - customer information is safe with the provider. Only state security agencies can get access to this kind of personal data.The only thing you can find out from the IP address is the location of the ISP's equipment. And such information indicates only the approximate geolocation of the user, accurate to the country and city.
On a local network, the address of the device is specified in the settings of the operating system, so you don't need to use external tools. You can determine the local IP address in the following ways.
Windows - through the command line (search -> "cmd" -> in the window type "ipconfig").
Unix/Linux - with the command "ifconfig".
MacOS - "System Preferences" -> "Network".
iOS - via "Settings. "Wi-Fi" -> click on the information icon "i" -> information in the tab "DHCP".
Android - "Settings" -> "About phone" -> "General information".
Anonymity and Security
"I'll identify you by IP."
This is more of a myth than a real threat. There is a misconception among users that an intruder can track a person by getting his external IP address. In fact, it's not that simple - customer information is safe with the provider. Only state security agencies can get access to this kind of personal data.The only thing you can find out from the IP address is the location of the ISP's equipment. And such information indicates only the approximate geolocation of the user, accurate to the country and city.
Ways to protect your IP address
Using a TOR, proxy or VPN can protect you from the threats listed above. These types of
protection hide the IP address, which anonymizes the user's online activity.The TOR network
works on the principle of "onion routing," where user traffic is rerouted through multiple
intermediary servers and out to the Internet. The user's public IP address changes
constantly, which anonymizes activity and prevents traffic from being tracked. You can start
using the TOR network by downloading the official Tor Browser, which, in addition to
routing, blocks trackers of Internet resources.
Proxies and VPNs work in a similar way. Traffic is redirected through a server (or several
servers) and goes to the Internet with an IP address substitution. VPN technology, unlike
proxies, encrypts data on the way from the user to the intermediary server, so it is
considered the best option in terms of security.
Conclusion
At the heart of the Internet and any IP/TCP network is IP addressing. Every system administrator should know its basics to build networks in both home and corporate environments.
It is also worth remembering about security, because a poorly configured network has vulnerabilities that can allow an intruder to disrupt connections or access personal information.
It is also worth remembering about security, because a poorly configured network has vulnerabilities that can allow an intruder to disrupt connections or access personal information.